According to a report by Ponemon Institute report, web-based attacks (62 percent) and Denial of Service attacks (60 percent) were cited as the most serious types of attacks experienced by the respondents’ companies. A majority (61 percent) of IT and IT security practitioners surveyed indicated the need for security systems that incorporate real-time, definitive and actionable intelligence about attackers.

Junos Spotlight Secure global attacker intelligence service consolidates attacker and threat information to feed real-time intelligence to Juniper’s security solutions. The system provides companies knowledge of the attacking devices, not just the IP address, so that this intelligence can be quickly disseminated across the data center and into the network. The first products to leverage Spotlight Secure security intelligence are Junos WebApp Secure and Juniper Networks SRX Series Services Gateways.

Junos Spotlight Secure can identify individual attackers at the device level and track them in a global database. Once an attacker is identified and fingerprinted on a subscriber’s network using Junos WebApp Secure, the database can immediately share the attacker profiles with other subscribers, providing advanced real-time security across multiple networks.

Juniper Networks SRX Series Services Gateways is integrated with Junos WebApp Secure which incorporates the latest Intrusion Deception technology, as well as the Junos Spotlight Secure global attacker intelligence service. This extends the ability of the SRX Series to block attackers that are identified at the security perimeter.

Junos DDoS Secure leverages technology from Webscreen Systems to deliver a fully automated DDoS protection system for websites and web applications. It can be deployed as either a hardware appliance or as a virtual machine in private, public, or hybrid cloud environments.

Juniper Networks security solutions will be incorporated into security service chains to enable additional intelligence sharing across network layers and quick deployment of security services as part of the SDN service chains.